Welcome to Cyberstrike Brief, your source for the latest cybersecurity insights in smart manufacturing.

Six Critical Steps to Secure the Space Sector

Our reliance on space for business, security, communications, and intelligence make satellite and space cybersecurity integral in this new digital age.

Securing space systems is imperative. Satellite security must be comprehensive covering all the facets of both terrestrial and orbiting satellites, including end-user routers and ground communications systems. There are actions that can be taken to mitigate vulnerabilities and threats. Below are a few suggestions that my late colleague, Paul Ferillio, Esq. suggested several years back.

Read More: Top Five Cyber Vulnerabilities of Space System Components

  1. The adoption of best practices for cybersecurity, such as those outlined in the NIST cybersecurity framework should be a first step and having a strategic approach is critical. In essence, it is about risk management and policies required to meet the growing threats to the space sector. NIST 8270, Introduction to Cybersecurity for Commercial Satellite Operations, notes that:

    “Space is a newly emerging commercial critical infrastructure sector that is no longer the domain of only national government authorities. Space is an inherently risky environment in which to operate, so cybersecurity risks involving commercial space – including those affecting commercial satellite vehicles – need to be understood and managed alongside other types of risks to ensure safe and successful operations.”
  2. Because space systems run in a combined OT/IT environment, Security by Design is important for the security of all of the space architectures. Every satellite should have security built in from the ground up, not as an afterthought. And the ground stations and data stations should employ the same principles.
  3. A strong intrusion detection system (IDS) should be the cornerstone of a satellite that is cyber-resilient. Continuous monitoring of telemetry, command sequences, command receiver status, shared bus traffic, flight software configuration, and operating states should all be part of the IDS. It should also be able to predict and adjust to counteract evolving hostile activity. Critical spacecraft systems should be able to be switched back to a recognized cyber-safe mode by the IPS and the ground crew. It should be possible to cross-check logs for unusual activities.
  4. Space system developers must put in place a supply chain risk management scheme. Every facility and system that uses ground-based space should be obliged to implement a comprehensive vendor supply chain risk management policy that includes all primary and secondary vendors. They have to make sure that every one of their providers follows the agreed-upon chain of custody while handling hardware and software. Aside from being identified and treated differently from noncritical units and subsystems in terms of requirements and rigor, critical units and subsystems should also be built with security in mind.
  5. For cross-validation, command logging and anomaly detection of sequences of commands should be carried out independently across space systems. In order to ensure consistency between commands given and received, directives received can be automatically recorded, transmitted to the ground through telemetry, and validated. And measures like signal strength monitoring and guarded transmitters and receivers should be taken to prevent communications jamming and spoofing; links should be encrypted for added protection.
  6. In addition to cyber hardening, protective shielding against environmental and electronic pulse dangers, as well as quantum encryption, should be taken into consideration in this rising digital age. Prioritizing networks that support vital national infrastructure against quantum computing-powered cyberattacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has already issued a warning. Quantum encryption will help reduce risks, and that scenario applies to space systems.

Read More: Hacking Space: Cyber-Securing the Vulnerable Space Enterprise Ecosystem

About the Author

Chuck Brooks, President and Consultant, Brooks Consulting International

Chuck Brooks serves as President and Consultant of Brooks Consulting International. Chuck also serves as an Adjunct Professor at Georgetown University in the Cyber Risk Management Program, where he teaches graduate courses on risk management, homeland security, and cybersecurity. Chuck has received numerous global accolades for his work and promotion of cybersecurity. Recently, he was named the top cybersecurity expert to follow on social media, and also as one top cybersecurity leaders for 2024. He has also been named "Cybersecurity Person of the Year" by Cyber Express, Cybersecurity Marketer of the Year, and a "Top 5 Tech Person to Follow" by LinkedIn” where he has 120,000 followers on his profile. Chuck has keynoted dozens of global conferences and written over 350 articles relating to technologies and cybersecurity. As a thought leader, blogger, and event speaker, he has briefed the G20 on energy cybersecurity, The US Embassy to the Holy See and the Vatican on global cybersecurity cooperation. He has served on two National Academy of Science Advisory groups, including one on digitalizing the USAF, and another on securing BioTech. He has also addressed USTRANSCOM on cybersecurity and serves on an industry/government Working group for DHS CISA focused on security space systems. In his career, Chuck has received presidential appointments for executive service by two U.S. presidents and served as the first Director of Legislative Affairs at the DHS Science & Technology Directorate. He served a decade on the Hill for the late Senator Arlen Specter on Capitol Hill on tech and security issues. Chuck has also served in executive roles for companies such as General Dynamics, Rapiscan, and Xerox. Chuck has an MA from the University of Chicago, a BA from DePauw University, and a certificate in International Law from The Hague Academy of International Law.

 

You Might Also Like